BT

Your opinion matters! Please fill in the InfoQ Survey!

rss
  • Cloud Follow 84 Followers

    Cloud Data Auditing Techniques with a Focus on Privacy and Security

    by Manjur Kolhar Follow 0 Followers , Mosleh M. Abu-Alhaj Follow 0 Followers , Saied M. Abd El-atty Follow 0 Followers on  Jul 30, 2017

    The authors provide a guide to the current literature regarding comprehensive auditing methodologies. They not only identify and categorize the different approaches to cloud data integrity and privacy but also compare and analyze their relative merits. For example, their research lists the strengths and weaknesses of earlier work on cloud auditing, which allows researchers to design new methods.

  • Architecture & Design Follow 794 Followers

    Philipp Jovanovic on NORX, IoT Security and Blockchain

    by Mathieu Bolla Follow 0 Followers , Philipp Jovanovic Follow 0 Followers on  May 22, 2017

    In this interview, originally published on InfoQ France, Mathieu Bolla talks to Philipp Jovanovic, a Cryptographer at EPFL, about NORX, IoT Security and keeping yourself safe on-line, and Blockchain.

  • DevOps Follow 305 Followers

    Securing the Modern Software Delivery Lifecycle

    by Dustin Collins Follow 0 Followers on  Feb 27, 2016 1

    Information security practice has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we think about securing our infrastructure and applications.

Followers

Answering Common Cloud Security Questions from CIOs

Posted by Gilad Parran-Nissany Follow 0 Followers on  Feb 12, 2014

With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2

Followers

Keeping Your Secrets

Posted by Dennis Sosnoski Follow 0 Followers on  Sep 30, 2013

Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2

Followers

Automating Data Protection Across the Enterprise

Posted by Arshad Noor Follow 0 Followers on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise. 1

Followers

Encrypting the Internet

Posted by Satyajit Grover Follow 0 Followers , Xiaozhu Kang Follow 0 Followers , Michael Kounavis andFrank Berry Follow 0 Followers on  Sep 22, 2009

The authors, from Intel, offer a three pronged approach to providing secure transmission of high volume HTML traffic using CPU instructions and a novel RSA algorithm to significantly reduce costs. 5

Followers

Automating File Uploads with SSH and Ruby

Posted by Matthew Bass Follow 0 Followers on  May 29, 2007

Did you know that in Ruby is not just a powerful, general-purpose OO programming language? Ruby is also useful for scripting! 11

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT